Information for virtual conference, please click here.

Information for virtual social event, please click here.

 Join the virtual conference at:

7th JUNE 8th JUNE 9th JUNE  10th JUNE
Morning  Workshops
Keynote 1 Keynote 2 Keynote 3
Session 1A: ML and security (I)
Session 1B: Cyber-physical systems
Session 4A: ML and security (III)
Session 4B: Measurement/empirical security
Session 7A: Privacy (II)
Session 7B: Software security and vulnerability analysis (II)
Lunch Lunch Break 2nd Poster Session/ Social Event
& Lunch Break
Lunch Break
Afternoon (I) Session 2A: Network and Web security (I)
Session 2B: Hardware security (I)
Session 5A: Network and Web security (II)
Session 5B: Applied cryptography (II)
Session 8A: Malware and cybercrime (I)
Session 8B: Blockchain and distributed systems
Afternoon (II) Session 3A: Applied cryptography (I)
Session 3B: ML and security (II)
Session 6A: Software security and vulnerability analysis (I)
Session 6B: Privacy (I)
Session 9A: Hardware security (II)
Session 9B: Malware and cybercrime (II)
Evening 1st Poster Session/ Social Event/
End of Day 1 Conference
End of Day 2 Conference End of Day 3 Conference

*All sessions of the conference will be held online. 

8th June, 2021 (Tuesday)
09:00 - 09:30 Welcome Message
09:30 - 10:30 Keynote Speech (I)
Speaker: Prof. Somesh Jha (University of Wisconsin, Madison)
Title: Trustworthy Machine Learning: Past, Present, and Future
Session Chair: Man Ho Au
10:30 - 11:00 Break
11:00 - 12:20 Session #1A: ML and Security (I)
Session Chair: Tianwei Zhang
  Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes
Jinyuan Jia, Binghui Wang, Neil Gong
  IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary
Xiaoyu Cao, Jinyuan Jia, Neil Gong
  A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks
Shameek Bhattacharjee, Praveen Madhavarapu, Sajal K. Das
  Exploiting the Sensitivity of L2 Adversarial Examples to Erase and Restore
Fei Zuo, Qiang Zeng
11:00 - 12:20 Session #1B: Cyber-Physical Systems
Session Chair: Mu Zhang
  ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li, Yingyuan Yang, Jinyuan Sun, Kevin Tomsovic, Hairong Qi
  EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech
S Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen
  HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks
Yi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu
  Conware: Automated Modeling of Hardware Peripherals
Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna
12:20 - 14:00 Lunch Break
14:00 - 15:20 Session #2A: Network and Web Security (I)
Session Chair: Xavier de Carné de Carnavalet
  Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication
Gordod Meiser, Pierre Laperdrix, Ben Stock
  Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies
Assel Aliyeva, Manuel Egele
  P2DPI: Practical and Privacy-Preserving Deep Packet Inspection
Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Nepal Surya
  Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakraborty
14:00 - 15:20 Session #2B: Hardware Security (I)
Session Chair: Fengwei Zhang
  Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels
Zhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao
  PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks
Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa
  HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard
  CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard
15:20 - 15:40  Break
15:40 - 17:00 Session #3A: Applied Cryptography (I)
Session Chair: Sherman S. M. Chow
  Efficient Verifiable Image Redacting based on zk-SNARKs
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
  Secure Role and Rights Management for Automotive Access and Feature Activation
Christian Plappert, Lukas Jäger, Andreas Fuchs
  Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption
Jie Li, Yamin Liu, Shuang Wu
  Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time
Yun Wang, Dimitrios Papadopoulos
15:40 - 17:00 Session #3B: ML and Security (II)
Session Chair: Pino Caballero-Gil
  HoneyGen: Generating Honeywords Using Representation Learning
Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos
  On Detecting Deception in Space Situational Awareness
James Pavur, Ivan Martinovic
  AMEBA: An Adaptive Approach to the Black-Box Evasion of Machine Learning Models
Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese
  Stealing Deep Reinforcement Learning Modelsfor Fun and Profit
Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu
17:00 - 19:00 1st Poster Session/Social Event
9th June, 2021 (Wednesday)
09:00 - 10:00 Keynote Speech (II)
Speaker: Prof. Elaine Shi (Carnegie Mellon University, Pittsburgh, PA)
Title: Streamlet: An Absurdly Simple, Textbook Blockchain Protocol
Session Chair: Moti Yung
10:00 - 10:30 Break
10:30 - 11:50 Session #4A: ML and Security (III)
Session Chair: Neil Gong
  REFIT: a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data
Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song
  Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs
Lun-Pin Yuan, Peng Liu, Sencun Zhu
  Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules
Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin
  DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
Yi Zeng, Han Qiu, Tianwei Zhang, Shangwei Guo, Meikang Qiu, Bhavani Thuraisingham
10:30 - 11:50 Session #4B: Measurement/Empirical Security
Session Chair: Yuan Zhang
  Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems
Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
  Analyzing the Overhead of Protection on File Accessing Using Linux Security Modules
Wenhui Zhang, Peng Liu, Trent Jaeger
  Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Oest, Adam Doupe, Sooel Son, Gail-Joon Ahn, Tudor Dumitras
  ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition
Wei Xie, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang
11:50 - 14:00 Lunch Break & 2nd Poster Session/Social Event
14:00 - 15:20 Session #5A: Network and Web Security (II)
Session Chair: Ding Wang
  Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang
  Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications
Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash
  Click This, Not That: Extending Web Authentication with Deception
Timothy Barron, Johnny So, Nick Nikiforakis
  Analyzing Spatial Differences in the TLS Security of Delegated Web Services
Joonhee Lee, Hyunwoo Lee, Jongheon Jeong, Doowon Kim, Taekyoung "Ted" Kwon
14:00 - 15:00 Session #5B: Applied Cryptography (II)
Session Chair: Xingliang Yuan
  Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits
Ruiyu Zhu, Yan Huang
  Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations
Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila Yavuz, Elisa Bertino
  Efficient Graph Encryption Scheme for Shortest Path Queries
Esha Ghosh, Seny Kamara, Roberto Tamassia
15:20 - 15:40 Break
15:40 - 17:00 Session #6A: Software Security and Vulnerability Analysis (I)
Session Chair: Kehuan Zhang
  How to Take Over Drones
Sebastian Plotz, Frederik Armknecht, Christian Bunse
  Localizing Vulnerabilities Statistically From One Exploit
Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury
  Cali: Compiler-Assisted Library Isolation
Markus Bauer, Christian Rossow
  Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment
Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang
15:40 - 17:00 Session #6B: Privacy (I)
Session Chair: Miroslaw Kutylowski
  Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps
Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes
  Low-Cost Hiding of the Query Pattern
Maryam Sepehri, Florian Kerschbaum
  Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension
Linpeng Lu, Ning Ding
  Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks
Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida
10th June, 2021 (Thursday)
09:00 - 10:00 Keynote Speech (III)
Speaker: Prof. Kui Ren (Zhejiang University)
Title: Encrypted Databases: Progresses and Challenges
Session Chair: Zhiqiang Lin
10:00 - 10:30 Break
10:30 - 11:50 Session #7A: Privacy (II)
Session Chair: Sherman S. M. Chow
  Cryptographic Key Derivation from Biometric Inferences for Remote Authentication
Erkam Uzun, Carter Yagemann, Simon Chung, Vladimir Kolesnikov, Wenke Lee
  Understanding the Privacy Implications of Adblock Plus‚Äôs Acceptable Ads
Ahsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das
  Privacy-preserving Density-based Clustering
Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
  DySan: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks
Theo Jourdan, Antoine Boutet, Carole Frindel, Claude Rosin Ngueveu, Sebastien Gambs
10:30 - 11:50 Session #7B: Software Security and Vulnerability Analysis (II)
Session Chair: Shuai Wang
  SoK: Enabling Security Analyses of Embedded Systems via Rehosting
Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Oleinik, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson
  BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network
Yuede Ji, Lei Cui, H. Howie Huang
  Evaluating Synthetic Bugs
Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek
  Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms
Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella, Christopher Kruegel, Giovanni Vigna
11:50 - 14:00 Lunch Break
14:00 - 15:00 Session #8A: Malware and Cybercrime (I)
Session Chair: Sang Kil Cha
  Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Keane Lucas, Mahmood Sharif, Lujo Bauer. Michael K. Reiter, Saurabh Shintre
  Identifying Behavior Dispatchers for Malware Analysis
Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee
  MalPhase: Fine-Grained Malware Detection Using Network Flow Data
Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi Mancini, Ivan Martinovic
14:00 - 16:00 Session #8B: Blockchain and Distributed Systems
Session Chair: Yajin Zhou
  Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts
Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan
  PSec: Programming Secure Distributed Systems using Enclaves
Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia
  Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains
Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen
  Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network
Yan Qiao, Kui Wu, Majid Khabbazian
  Redactable Blockchain Supporting Supervision and Self-Management
Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu
  Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual
Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu
16:00 - 16:20 Break
16:20 - 17:20 Session #9A: Hardware Security (II)
Session Chair: Guoxing Chen
  (Mis)managed: A Novel TLB-based Covert Channel on GPUs
Ajay Nayak, Pratheek B, Vinod Ganapathy, Arkaprava Basu
  Scanning the Cycle: Timing-based Authentication on PLCs
Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya Mathur
  Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors
Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei
16:20 - 17:20 Session #9B: Malware and Cybercrime (II)
Session Chair: Junghwan "John" Rhee
  Analysis and Takeover of the Bitcoin-Coordinated Pony Malware
Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr
  See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer
Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, SongSong Liu, Yukun Liu, Xiaoning  Li
  UltraPIN: Inferring PIN Entries via Ultrasound
Ximing Liu, Yingjiu Li, Robert H. Deng
17:20 - 17:30 Closing Remark

*All time are (GMT+8).